You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
本书精选了CIB W99“建筑安全与健康的全球合作”国际会议论文75篇,涉及有关建筑安全与健康的法律、战略和发展规划,规范和标准,教育培训和持续学习,风险分析与决策,安全投资和效益,量测及定量分析,信息技术和自动控制的应用等内容。
The sixteen-volume set comprising the LNCS volumes 11205-11220 constitutes the refereed proceedings of the 15th European Conference on Computer Vision, ECCV 2018, held in Munich, Germany, in September 2018.The 776 revised papers presented were carefully reviewed and selected from 2439 submissions. The papers are organized in topical sections on learning for vision; computational photography; human analysis; human sensing; stereo and reconstruction; optimization; matching and recognition; video attention; and poster sessions.
The eight-volume set comprising LNCS volumes 9905-9912 constitutes the refereed proceedings of the 14th European Conference on Computer Vision, ECCV 2016, held in Amsterdam, The Netherlands, in October 2016. The 415 revised papers presented were carefully reviewed and selected from 1480 submissions. The papers cover all aspects of computer vision and pattern recognition such as 3D computer vision; computational photography, sensing and display; face and gesture; low-level vision and image processing; motion and tracking; optimization methods; physics-based vision, photometry and shape-from-X; recognition: detection, categorization, indexing, matching; segmentation, grouping and shape representation; statistical methods and learning; video: events, activities and surveillance; applications. They are organized in topical sections on detection, recognition and retrieval; scene understanding; optimization; image and video processing; learning; action activity and tracking; 3D; and 9 poster sessions.
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach—the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump—makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from techn...
The four-volume set LNCS 7724--7727 constitutes the thoroughly refereed post-conference proceedings of the 11th Asian Conference on Computer Vision, ACCV 2012, held in Daejeon, Korea, in November 2012. The total of 226 contributions presented in these volumes was carefully reviewed and selected from 869 submissions. The papers are organized in topical sections on object detection, learning and matching; object recognition; feature, representation, and recognition; segmentation, grouping, and classification; image representation; image and video retrieval and medical image analysis; face and gesture analysis and recognition; optical flow and tracking; motion, tracking, and computational photography; video analysis and action recognition; shape reconstruction and optimization; shape from X and photometry; applications of computer vision; low-level vision and applications of computer vision.
Spying in the United States began during the Revolutionary War, with George Washington as the first director of American intelligence and Benedict Arnold as the first turncoat. The history of American espionage is full of intrigue, failures and triumphs--and motives honorable and corrupt. Several notorious spies became household names--Aldrich Ames, Robert Hanssen, the Walkers, the Rosenbergs--and were the subjects of major motion pictures and television series. Many others have received less attention. This book summarizes hundreds of cases of espionage for and against U.S. interests and offers suggestions for further reading. Milestones in the history of American counterintelligence are noted. Charts describe the motivations of traitors, American targets of foreign intelligence services and American traitors and their foreign handlers. A former member of the U.S. intelligence community, the author discusses trends in intelligence gathering and what the future may hold. An annotated bibliography is provided, written by Hayden Peake, curator of the Historical Intelligence Collection of the Central Intelligence Agency.
The five-volume set LNCS 9003--9007 constitutes the thoroughly refereed post-conference proceedings of the 12th Asian Conference on Computer Vision, ACCV 2014, held in Singapore, Singapore, in November 2014. The total of 227 contributions presented in these volumes was carefully reviewed and selected from 814 submissions. The papers are organized in topical sections on recognition; 3D vision; low-level vision and features; segmentation; face and gesture, tracking; stereo, physics, video and events; and poster sessions 1-3.
Craziness and Carnival in Neo-Noir Chinese Cinema offers an in-depth discussion of the “stone phenomenon” in Chinese film production and cinematic discourses triggered by the extraordinary success of the 2006 low-budget film, Crazy Stone. Surveying the nuanced implications of the film noir genre, Harry Kuoshu argues that global neo noir maintains a mediascape of references, borrowings, and re-workings and explores various social and cultural issues that constitute this Chinese episode of neo noir. Combining literary explorations of carnival, postmodernism, and post-socialism, Kuoshu advocates for neo noir as a cultural phenomenon that connects filmmakers, film critics, and film audiences rather than an industrial genre.